How to classify Red Hat OpenShift audit logs
This guide helps you understand OpenShift audit logs and classify them based on the resource involved and the action performed.
This guide helps you understand OpenShift audit logs and classify them based on the resource involved and the action performed.
Learn about a new Red Hat OpenShift Service on AWS (ROSA) with hosted control planes feature that streamlines access to your ROSA clusters.
The Adoptium project has achieved reproducible builds for Java versions 21 and 22 across Linux, Windows, and Mac platforms. This capability ensures an independently verifiable path from source to binary code, enhancing trust in the software and its dependencies.
Learn about the open source Backstage project and how it empowers developers by providing a central platform to build customizable developer portals.
A common platform for machine learning and app development on the hybrid cloud.
Applications based on machine learning and deep learning, using structured and unstructured data as the fuel to drive these applications.
Discover how Red Hat Trusted Software Supply Chain makes it easier to create, deploy, and host security-focused applications in the container era.
Learn how to install the Red Hat Trusted Artifact Signer using Google identity
Join Red Hat Developer for the software and tutorials to develop cloud applications using Kubernetes, microservices, serverless and Linux.
Get an introduction to Red Hat Developer Hub, based on the open source Backstage project, and discover how it streamlines the software development process.
Learn about the new Kubernetes Operator in the Red Hat build of Keycloak, which enables reliable management of Kubernetes applications.
The Tech Preview of the Red Hat Trusted Artifact Signer (RHTAS) is now available
Microservices breakdown your application architecture into smaller, independent
We've rounded up videos from DevNation Day: Modern App Dev, a virtual event for developers covering software, containers, modernization, and more.
This short guide introduces key principles, tools, and techniques you need to know to better audit and act on vulnerabilities in open source software.
Drive team productivity and accelerate innovation.
Developer experience plays a critical role in the digital transformation journey. Discover how an internal developer platform (IDP) helps teams innovate faster.
Select tutorials for in-person events
Learn the best traits for build, deploy, and runtime pipelines in the increasingly popular practice of DevSecOps.
Get a video introduction to Project Thoth's cloud-based Python dependency resolver, then learn how to manage Python dependencies on the Thoth command line.
Learn what DevSecOps is, why it matters, and how to start using it to create secure code at the beginning of your projects with this guide from Red Hat.
Highlights of December 2021 include two guides for integrating Red Hat OpenShift Streams for Apache Kafka. Read the entire monthly recap for further details.
Get step-by-step instructions to install and configure a self-signed certificate for secure HTTPS communication with Red Hat Decision Manager.
Extend common DevOps tools and processes with DevSecOps to improve app security. Enable security automation and help teams collaborate on security policies.
Learn to automate dependency analytics by integrating code scanning into your CI pipeline. Use the CodeReady Dependency Analytics GitHub Action to spot flaws.